Davide Ariu

According to our database1, Davide Ariu authored at least 26 papers between 2007 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
DeltaPhish: Detecting Phishing Webpages in Compromised Websites.
Proceedings of the Computer Security - ESORICS 2017, 2017

Social Engineering 2.0: A Foundational Work: Invited Paper.
Proceedings of the Computing Frontiers Conference, 2017

Deepsquatting: Learning-Based Typosquatting Detection at Deeper Domain Levels.
Proceedings of the AI*IA 2017 Advances in Artificial Intelligence, 2017

2016
The Dark Side of Open Data.
Proceedings of the 2nd International Workshop on Knowledge Discovery on the WEB, 2016

Pharmaguard WebApp: An Application for the Detection of Illegal Online Pharmacies.
Proceedings of the 2nd International Workshop on Knowledge Discovery on the WEB, 2016

Detecting Misuse of Google Cloud Messaging in Android Badware.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
Machine Learning in Security Applications.
Trans. MLDM, 2015

Stealth attacks: An extended insight into the obfuscation effects on Android malware.
Comput. Secur., 2015

Clustering android malware families by http traffic.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

The maven project: Management and Authenticity Verification of multimedia contents.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

An Evasion Resilient Approach to the Detection of Malicious PDF Files.
Proceedings of the Information Systems Security and Privacy, 2015

A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files.
Proceedings of the ICISSP 2015, 2015

PharmaGuard: Automatic identification of illegal search-indexed online pharmacies.
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015

2020 Cybercrime Economic Costs: No Measure No Solution.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Yet Another Cybersecurity Roadmapping Methodology.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

Poisoning behavioral malware clustering.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Scalable fine-grained behavioral clustering of HTTP-based malware.
Comput. Networks, 2013

Is data clustering in adversarial settings secure?
Proceedings of the AISec'13, 2013

2011
HMMPayl: An intrusion detection system based on Hidden Markov Models.
Comput. Secur., 2011

A Modular Architecture for the Analysis of HTTP Payloads Based on Multiple Classifiers.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011

Machine learning in computer forensics (and the lessons learned from machine learning in computer security).
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
HMMPayl: an application of HMM to the analysis of the HTTP Payload.
Proceedings of the First Workshop on Applications of Pattern Analysis, 2010

2009
McPAD: A multiple classifier system for accurate payload-based anomaly detection.
Comput. Networks, 2009

HMM-Web: A Framework for the Detection of Attacks Against Web Applications.
Proceedings of IEEE International Conference on Communications, 2009

2007
Sensing Attacks in Computers Networks with Hidden Markov Models.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007


  Loading...